Title: A Game Theoretic Model of Thermonuclear Cyberwar

Abstract

In this paper we propose a formal game theoretic model of thermonuclear cyberwar based on ideas found in [1] and [2]. Our intention is that such a game will act as a first step toward building more complete formal models of Cross-Domain Deterrence (CDD). We believe the proposed thermonuclear cyberwar game is an ideal place to start on such an endeavor because the game can be fashioned in a way that is closely related to the classical models of nuclear deterrence [4–6], but with obvious modifications that will help to elucidate the complexities introduced by a second domain. We start with the classical bimatrix nuclear deterrence game based on the game of chicken, but introduce uncertainty via a left-of-launch cyber capability that one or both players may possess.

@article{osti_1404836,
title = {A Game Theoretic Model of Thermonuclear Cyberwar},
author = {Soper, Braden C.},
abstractNote = {In this paper we propose a formal game theoretic model of thermonuclear cyberwar based on ideas found in [1] and [2]. Our intention is that such a game will act as a first step toward building more complete formal models of Cross-Domain Deterrence (CDD). We believe the proposed thermonuclear cyberwar game is an ideal place to start on such an endeavor because the game can be fashioned in a way that is closely related to the classical models of nuclear deterrence [4–6], but with obvious modifications that will help to elucidate the complexities introduced by a second domain. We start with the classical bimatrix nuclear deterrence game based on the game of chicken, but introduce uncertainty via a left-of-launch cyber capability that one or both players may possess.},
doi = {10.2172/1404836},
journal = {},
number = ,
volume = ,
place = {United States},
year = 2017,
month = 8
}

Successful regional water-resources planning involves an efficiency analysis to find the optimal system that maximizes benefits minus costs, and an equity analysis to apportion project costs. Traditionally, these two problems have been treated separately. A reliable total numerization procedure is used to find the optimal system for regional water-network problems. This procedure is easy to understand and can be implemented using readily available computer software; furthermore, more engineers can use realistic cost functions or perform detailed cost analysis and, also, examine good suboptimal systems. In addition, this procedure finds the optimal system for each individual and each subgroup of individuals;more » hence, an equity analysis can be accomplished using the theory of the core from cooperative n-person game theory on the optimal system as well as good suboptimal systems. A rigorous procedure using core conditions and linear programming is described to unambiguously measure an individual's minimum cost and maximum cost as a basis for the equitable cost allocation. Traditional approaches for quantifying minimum cost and maximum cost assume that either a regional system involving the grand coalition is built or all the individuals will go-it-alone.« less

Competition in electric generation has brought increased attention to existing transmission access and pricing policies. New policies have been proposed by several parties (including NRRI). This study summarizes, the various proposals for reform, examines the issues they raise, and offers a way of analyzing the strategic behavior of sellers, wheelers, and buyers of wholesale power as they face new access and pricing rules. Finally, the study applies game theory as a way for regulators to evaluate behaviors and outcomes, both short run and long run. 60 refs., 54 figs., 13 tabs.

A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

In previous analyses with the Game Theoretic World Oil Model, time varying production capacity constraints for individual pools have been imposed exogenously. In this report, the possibility of endogenous determination of capacity within the model framework is explored. There have been two major steps associated with this task. The first has been the development of the mathematical foundations of optimal capacity expansion in the dynamic game theoretic setting. The results of this effort are presented in the Appendix. The authors have succeeded in deriving results which are of independent theoretical interest, and which furthermore, lead directly to the specification ofmore » the algorithmic steps required. The second major effort has been the implementation and testing of the new algorithm. The results here are disappointing. The algorithm appears to operate correctly, producing results which are consistent with the theory. The computational burden is simply too great, however, to allow optimal investment levels to be routinely computed in the model. The underlying source of the difficulty is the extreme sensitivity of the optimal investment calculations.« less

The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology canmore » predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.« less